US7171555B1 - Method and apparatus for communicating credential information within a network device authentication conversation - Google Patents

Method and apparatus for communicating credential information within a network device authentication conversation Download PDF

Info

Publication number
US7171555B1
US7171555B1 US10/449,180 US44918003A US7171555B1 US 7171555 B1 US7171555 B1 US 7171555B1 US 44918003 A US44918003 A US 44918003A US 7171555 B1 US7171555 B1 US 7171555B1
Authority
US
United States
Prior art keywords
message
supplicant
conversation
eap
recited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/449,180
Inventor
Joseph Salowey
William Gossman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Priority to US10/449,180 priority Critical patent/US7171555B1/en
Assigned to CISCO TECHNOLOGY, INC. reassignment CISCO TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GOSSMAN, WILLIAM, SALOWEY, JOSEPH
Priority to US11/651,742 priority patent/US7793336B2/en
Application granted granted Critical
Publication of US7171555B1 publication Critical patent/US7171555B1/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention generally relates to computer network security and authentication.
  • the invention relates more specifically to a method and apparatus for communicating credential information within a network device authentication conversation.
  • Distributing security credential information for use in verifying and proving the identity of a computer network device is a problem in the fields of network and information security.
  • cryptosystems that use public key cryptography there is a need to verify that a public key actually belongs to its purported owner, so that the public key can be trusted.
  • One approach for establishing such trust is to use a root digital certificate to sign the key prior to distribution. For a recipient to then verify the signed key, the recipient must first receive the root certificate in some manner.
  • credentials for which distribution is commonly needed include public key-private key pairs, digital certificates such as server root certificates and public key certificates, and other material.
  • Certain packet-switched networks use authentication servers to authenticate clients that request access to protected resources, including end station devices such as servers and printers, and other infrastructure elements such as routers or switches.
  • a requesting client may wish to receive a credential, such as a digital certificate, to verify an authentication server.
  • the client may need to receive its own certificate to use to prove its own identity to another domain.
  • a client may receive a digital certificate from an enterprise domain and then use that certificate to sign communications to other domains.
  • a subscriber and a peer communicate in a non-secure conversation, and the credentials are distributed manually through a separate, out-of-band process that is typically secured using encryption.
  • this approach suffers from the drawbacks that a separate out-of-band process must be established and agreed upon by the peers; encryption keys must be exchanged among the peers in some manner; and the existence of a separate channel creates a new opportunity for attack or exploitation by a malicious interloper.
  • EAP implementations have been developed for many specific contexts. For example, in the context of mobile wireless devices that use the Global System for Mobile communications (GSM), an approach for authentication and deriving session keys using the GSM Subscriber Identity Module (SIM) is described in H. Haverinen et al., “EAP SIM Authentication,” IETF Internet-Draft, February 2003. In these contexts, EAP generally results in exchanging authentication credentials, and may include a key exchange in which peers acquire keys needed to decipher packets sent under a link layer protocol, such as IEEE 802.11.
  • GSM Global System for Mobile communications
  • SIM GSM Subscriber Identity Module
  • FIG. 1A is a block diagram that illustrates an overview of a network context in which an embodiment may be implemented
  • FIG. 1B is a flow diagram that illustrates a high level overview of a process of communicating a security credential within a network device authentication conversation
  • FIG. 2A and FIG. 2B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a root certificate or certificate fingerprint that can be used to verify the identity of one or more entities;
  • FIG. 2C is a diagram that illustrates a variation of the conversation of FIG. 2A , FIG. 2B , in which a generic EAP-Method is used and the authentication server is configured to send a root certificate in a protected type-length-value attribute;
  • FIG. 3A and FIG. 3B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a private/public key pair and public key certificate to the supplicant;
  • FIG. 4A and FIG. 4B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request a public key certificate based on an existing public-private key pair and to retrieve a certificate;
  • FIG. 5A and FIG. 5B are diagrams that illustrate a variation of the message conversation of FIG. 4A , FIG. 4B , wherein the authenticator queries the supplicant to determine whether a certificate or key pair is needed;
  • FIG. 6 is a block diagram that illustrates a computer system upon which an embodiment may be implemented.
  • a method for communicating a security credential within a network device authentication conversation comprises, in one aspect, a method for communicating a security credential within a network device authentication conversation.
  • An authenticator that is communicatively coupled to a supplicant through a network performs a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant.
  • a second message conversation is initiated between the authenticator and the supplicant.
  • the second message conversation is cryptographically protected using the same security context that was created in the first message conversation.
  • a security credential is provided to the supplicant in the second message conversation.
  • the second message conversation and first message conversation are then concluded.
  • the first message conversation and the second message conversation are for granting initial network access.
  • Specific embodiments can bootstrap digital certificates, public/private key pairs, and other credentials to supplicants, in-band, within the context of an EAP-SIM or EAP-AKA conversation, without initiating a new session or exchanging special-purpose keys to protect distribution of the credentials.
  • the invention encompasses a computer apparatus and a computer-readable medium configured to carry out the foregoing steps.
  • the present approach provides a method for using EAP-SIM and EAP-AKA to bootstrap certificates or public key pairs into a supplicant.
  • the method may be generalized to other EAP mechanisms based on different security associations.
  • the method can use existing GSM security relationships to verify and bootstrap public key credentials.
  • the present approach allows credentials to be distributed in band.
  • the credentials can then be used for protecting the identity of the subscriber, authenticating additional security services and upgrading security credentials.
  • an embodiment includes a protected attribute to request and an attribute to distribute a root certificate or certificate fingerprint that can be used to verify the identity of one or more entities. This attribute is authenticated, but not necessarily encrypted.
  • an embodiment provides an attribute to request and an attribute to distribute a private/public key pair and public key certificate to the supplicant.
  • an embodiment provides an attribute to request a public key certificate based on an existing public/private key pair, and to retrieve a certificate.
  • an embodiment provides an attribute that can be used to verify the endpoint of an encapsulating security protocol that uses public key credentials to authenticate the endpoint, such as PEAP or TTLS.
  • Embodiments may be used in EAP-compatible authentication servers, such as RADIUS AAA servers, and in 802.1X WLAN EAP supplicants. Embodiments are useful in public wireless LAN environments that make use of GSM credentials.
  • a supplicant or other client obtains a security credential early in a session. Further, credentials acquired in a first key exchange are used to protect a second exchange, without initiating a separate session, and without otherwise distributing credentials specifically for use in the second exchange.
  • FIG. 1A is a block diagram that illustrates an overview of a network context in which an embodiment may be implemented.
  • a wireless network device 102 is communicatively coupled wirelessly to a wireless access point 109 , which is coupled to a wireless packet network 106 .
  • device 102 is an end station such as a personal computer, personal digital assistant, cellular radiotelephone, etc.
  • device 102 has the role of Supplicant to an Authenticator.
  • Device 102 has an identity verification module 103 , comprising electronic hardware, firmware, or a combination, and which enables network 106 or WAP 109 to verify the identity of the device.
  • Network 106 is any network that can support communication with mobile wireless devices.
  • network 106 is a packet network.
  • network 106 is a digital wireless packet network that conforms to the IEEE 802.11 standards.
  • the identity verification module 103 of device 102 is a Subscriber Identity Module (SIM).
  • SIM Subscriber Identity Module
  • module 103 can execute the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism, which is based on symmetric keys.
  • UMTS Universal Mobile Telecommunications System
  • AKA Authentication and Key Agreement
  • Network 106 is communicatively coupled to an enterprise network 130 through an edge router 104 and firewall 110 .
  • WAP 109 typically acts as Authenticator; however, edge router 104 also may serve as an authenticator.
  • the WAP 109 may be granting access to the Internet at a large enterprise or other enterprise.
  • One or more content servers 112 A, 112 B form part of enterprise network 130 , and contain application programs, data or other content of interest to the device 102 .
  • An authentication server 120 is coupled to edge router 104 and stores one or more digital certificates 122 A, 122 B.
  • the authentication server 120 communicates with edge router 104 using an authentication protocols such as Remove Access Dial-In User Service (RADIUS) or TACACS+.
  • RADIUS Remove Access Dial-In User Service
  • TACACS+ TACACS+
  • wireless device 102 can authenticate itself to WAP 109 in an EAP conversation termed EAP over LAN or EAPOL; the WAP and authentication server 120 communicate EAP messages using EAP over RADIUS or an equivalent protocol.
  • EAP over LAN or EAPOL EAP over LAN
  • authentication server 120 communicate EAP messages using EAP over RADIUS or an equivalent protocol.
  • device 102 initially attempts access to a server, such as server 112 A, WAP 109 blocks port access to the network 106 ; if the device authenticates successfully, then port access is opened.
  • authentication server 120 may be coupled to a router of enterprise network 130 other than an edge router 104 .
  • edge router 104 may act as a gateway between network 106 and LAN 130 .
  • Edge router 104 may be a switch, bridge or relay.
  • FIG. 1B is a flow diagram of a process of communicating a security credential within a network device authentication conversation. The process of FIG. 1B can be performed in the network context of FIG. 1A , or in other contexts.
  • an authenticator which is communicatively coupled to a supplicant through a network, performs a first message conversation.
  • a security context that is known to the authenticator and the supplicant is created, as shown in block 151 .
  • a first authentication conversation is initiated.
  • a server or other that permits access only by authenticated clients may receive a request for access from a non-authenticated client.
  • the server initiates a message conversation directed at determining whether the server can authenticate the identity of the client.
  • the server receives a client identifier from the client.
  • the client identifier uniquely identifies the client. For example, when the client is a mobile wireless device operating in a GSM network, the identifying information could be the user's International Mobile Subscriber Identity (IMSI) value or a temporary identity value.
  • IMSI International Mobile Subscriber Identity
  • the server may contact a trusted network infrastructure element, provide the device identifying information, and request corresponding authentication information.
  • a trusted network infrastructure element For example, when the client is a mobile wireless device operating in a GSM network, the server contacts the user's home operator's Authentication Centre and requests one or more GSM triplets.
  • the server also generates one or more encryption keys for selective use in encrypting subsequent communications with the client. The keys are generated based on the authentication information, such as the GSM triplets.
  • a second message conversation is initiated between the authenticator and the supplicant.
  • the second message conversation is cryptographically protected using the same security context that was created in the first message conversation.
  • the server can generate and send a message that challenges the client to prove that it is trusted. Further, the server can receive a request to provide validation information that validates the identity of the server. For purposes of illustrating a clear example, the following description assumes that the validation information comprises a digital certificate. However, in other embodiments the validation information could comprise any other useful information. Further, the request may seek information other than validation information, such as public-private key pairs, public key certificates, etc.
  • a security credential is provided to the supplicant in the second message conversation.
  • the server retrieves a copy of its digital certificate, computes a message authentication code (MAC) over the digital certificate, and sends the certificate and MAC to the client.
  • the MAC may be computed as a hashed MAC using the SHA-1 algorithm, MD-5 algorithm, or any other suitable message authentication or message digest process.
  • the server receives a message from the client indicating that the MAC was successfully verified.
  • the client may verify the MAC by re-computing its own MAC over the received digital certificate, and comparing the computed MAC to the MAC that it received. If a match occurs, the message is verified.
  • FIG. 2A and FIG. 2B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a root certificate or certificate fingerprint that can be used to verify the identity of one or more entities.
  • FIG. 2A and FIG. 2B show a message conversation that may be used in the context of EAP-SIM authentication, as described in Haverinen et al., cited above.
  • EAP-AKA authentication which is described in J. Arkko, “EAP AKA Authentication,” February 2003, available at the time of this writing in the document draft-arkko-pppext-eap-aka-09.txt, in directory Internet-Drafts of the IETF.org domain on the World Wide Web.
  • a supplicant 102 such as wireless device 102 of FIG. 1A , initiates the conversation by sending an EAP over LAN (“EAPOL”) Start message 202 to WAP 109 .
  • EAPOL EAP over LAN
  • EAPOL-Start message 202 is sent by supplicant 102 after the supplicant seeks to access a protected resource and receives a response indicating that access is denied.
  • the authenticator 109 which may be an edge router, firewall, gateway, or server, then issues an EAP-Request message 204 with subtype Identity.
  • message 204 operates as a request for the supplicant to identify itself.
  • supplicant 102 sends an EAP-Response message 206 with subtype Identity, and includes identifying information in a message attribute.
  • the identifying information could be the user's International Mobile Subscriber Identity (IMSI) value or a temporary identity value.
  • IMSI International Mobile Subscriber Identity
  • the message 206 is passed or forwarded to authentication server 120 by authenticator 109 .
  • a separate identity exchange is not always required for EAP-SIM and AKA.
  • Message 208 and message 210 represent a negotiation of a version of the EAP-SIM protocol between the supplicant 102 and the authentication server 120 .
  • authentication server 120 after receiving client identity information in message 206 , authentication server 120 creates a list of EAP-SIM versions that it supports and provides the list as part of EAP-Request/SIM/Start message 208 .
  • the supplicant 102 selects a version that it can support, and provides a value identifying the selected version in the EAP-Response/SIM/Start message 210 .
  • authentication server 120 challenges the supplicant 102 to prove that it is the client that was identified using the identity information provided in message 206 .
  • authentication server 120 obtains one or more GSM triplets from the user's home operator's Authentication Centre in wireless device network 106 . Typically one, two, or three triplets are obtained. From the triplets, the authentication server derives keys, in the manner specified in Haverinen et al. The authentication server 120 then sends an EAP-Request/SIM/Challenge message to supplicant 102 that includes challenge values and a MAC covering the challenge values.
  • supplicant 102 requests authentication server 120 to provide information that can verify the identity of the authentication server. For example, supplicant 102 sends an EAP-Response/SIM message 214 that includes both a Challenge attribute and an attribute requesting the authentication server 120 to distribute a root digital certificate to the supplicant.
  • Root-Cert-Distrib attribute indicates the request of the supplicant 102 for a digital certificate.
  • the authentication server retrieves a copy of its root digital certificate, and generates a message authentication code based on the certificate.
  • the certificate is packaged in a message attribute.
  • the authentication server 120 sends a response message 224 to the supplicant 102 , and provides the root certificate and authentication code.
  • authentication server 120 sends the message EAP-Response/SIM/Root-Cert-Distrib and includes an attribute indicating that it is responding with its root certificate (ROOT-CERT-RESP), an attribute containing the root certificate (ROOT-CERT), and the message authentication code covering the certificate (AT_MAC).
  • the supplicant 102 attempts to verify the MAC that was received with the certificate. If the supplicant is able to verify the MAC, then the supplicant 102 sends a response message indicating success and proving knowledge of the MAC algorithm, such as EAP-Response/SIM/Root-Cert-Distrib with a SUCCESS attribute and MAC attribute.
  • the authentication server indicates successful end to authentication with an EAP-Success message.
  • the EAP-SIM authentication conversation of a supplicant and authenticator or authentication server is leveraged to provide substantially concurrent distribution of other security credentials, such as a digital certificate.
  • FIG. 2C is a diagram that illustrates a variation of the conversation of FIG. 2A , FIG. 2B , in which a generic EAP-Method is used and the authentication server is configured to send a root certificate in a protected EAP type-length-value (“TLV”) attribute.
  • TLV EAP type-length-value
  • the process of FIG. 2C is appropriate when the authentication server needs to send a root certificate that the supplicant is not currently using.
  • EAP protected TLV attributes is described in J. Salowey, “Protected EAP TLV,” March 2003, available at the time of this writing in the document draft-salowey-eap-protectedtlv-01.txt at the internet-drafts directory of the IETF.org domain on the World Wide Web.
  • a process using the steps of FIG. 2C begins by performing step 202 to step 210 , inclusive, of FIG. 2A .
  • authentication server 120 issues a challenge request in step 212 .
  • supplicant 102 issues a conventional response to the challenge request.
  • the response does not include a request for a digital certificate of authentication server 120 , but the authentication server is configured to know that it should deliver its root certificate in reply to such a response.
  • authentication server 120 retrieves its digital certificate and packages the certificate in a protected TLV attribute.
  • the protected TLV attribute is encrypted and contains a MAC.
  • the authentication server delivers the certificate by sending a response message that includes the certificate.
  • authentication server 120 sends an EAP-TLV Response message that includes an attribute identifying the response as a response that provides a root certificate, the root certificate itself, and a protected TLV that contains a separately encrypted version of the root certificate.
  • Sending an encrypted version of the root certificate allows the supplicant 120 to verify that the certificate is authentic, without use of a separate MAC attribute value, by successfully decrypting the encrypted certificate.
  • the protected TLV attribute is verified.
  • the supplicant issues a response indicating success, in the form of an EAP-TLV message.
  • Authentication server 120 may then reply with a success message, as in block 230 .
  • an EAP-SUCCESS message may be used after the SIM phase of FIG. 2C is complete, such as in the case when the process of FIG. 2C is run outside a protected tunnel.
  • FIG. 3A and FIG. 3B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a private/public key pair and public key certificate to the supplicant.
  • the process may be used to distribute only a certificate for an existing client key pair, or both the key pair and a certificate.
  • blocks 202 through 212 inclusive, involve messages that are communicated in the same manner and for the same purposes as for like numbered steps of FIG. 2A .
  • supplicant 120 sends a challenge response message that specifies a key request.
  • authentication server 120 In response, in block 304 , authentication server 120 generates a key pair and digital certificate. Block 304 may be performed by another entity in response to a separate request issued by the authentication server 120 . Further, block 304 may involve retrieval of a key pair or certificate, or both, from a database, rather than generating the information.
  • the key pair and certificate are packaged in an EAP message attribute. In one embodiment, the public key from the key pair and the certificate are packaged in an encrypted attribute of the type identified as “AT_ENC” in RFCs covering EAP. Further, block 306 involves generating a message authentication code covering the entire response.
  • the authentication server 120 returns the encrypted key pair and digital certificate, with authentication code, to the supplicant 102 in an EAP response message.
  • an EAP-Response/SIM/Root-Cert-Distrib message is sent from the authentication server to the supplicant.
  • the supplicant 102 verifies the message attribute that contains the key pair and certificate. Verification typically involves generating a new message authentication code over the message attribute and determining if the new message authentication code matches the MAC received with the message.
  • the public key is stored by the supplicant 102 . Further, the supplicant 102 notifies the authentication server 120 that verification was successful, by sending a success response message in block 314 .
  • the success response message also includes a MAC attribute for verification by the authentication server 120 .
  • the authentication server acknowledges the success response.
  • FIG. 3B may be performed by using a generic EAP-method with certain values packaged in an EAP protected TLV.
  • block 202 to block 212 are performed as shown in FIG. 3A , FIG. 3B .
  • a generic EAP-Response/SIM/Challenge message is sent.
  • authentication server 120 Upon receiving such a message, authentication server 120 cannot know that the supplicant is specifically requesting a public key of a public-private key pair. Nevertheless, based on stored client profile information, the authentication server may determine that a key distribution is requested.
  • the authentication server 120 generates or retrieves a key pair and certificate, and places the values in a protected TLV attribute.
  • the values are returned to the supplicant in an EAP-Response message with the protected TLV attribute and that identifies the response as a key distribution message.
  • the supplicant 102 verifies the protected TLV value, and responds with a Success message, which is acknowledged by the authentication server 120 .
  • the method of FIG. 3A , FIG. 3B also may be used to authenticate an unauthenticated encapsulating PEAP tunnel.
  • the EAP-Response/SIM/Root-Cert-Distrib attribute can be used to verify the identity of the endpoint of the encapsulating security protocol that uses public key credentials to for authentication, such as PEAP or TTLS.
  • the public key or certificate chain that is used to establish the security in the encapsulating protocol must be certified by the certificate of the Root-Cert-Distrib attribute.
  • FIG. 4A and FIG. 4B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request a public key certificate based on an existing public-private key pair and to retrieve a certificate.
  • the supplicant 102 has the capability to generate its own public-private key pairs; therefore, the supplicant only needs to request a certificate.
  • the certificates may be valid for a long period of time or a short period of time.
  • Block 214 involves presenting only a certificate request to the authentication server 120 .
  • the certificate request contains a standard certificate request, such as PKCS#10.
  • the authentication server 120 contacts a certificate authority, or other third party or element, to obtain a certificate for the supplicant.
  • the certificate received from the third party is packaged in a message attribute.
  • the certificate is packaged in an AT_CERT message attribute within an encrypted AT_ENC attribute to protect the privacy of the identity in the certificate.
  • a response message containing the encrypted attribute and a message authentication code is sent to the supplicant in block 406 .
  • the supplicant 102 verifies the message authentication code using the techniques described above for verification. If verification is successful, then in block 410 the certificate is stored. Further, in block 412 a response message indicating success is sent back to the authentication server 120 . The authentication server acknowledges success with a responsive success message, as shown in block 316 .
  • FIG. 4A and FIG. 5B are diagrams that illustrate a variation of the message conversation of FIG. 4A , FIG. 4B , wherein the authenticator queries the supplicant to determine whether a certificate or key pair is needed.
  • block 202 to block 214 are performed in accordance with the description given above for like-numbered steps with respect to FIG. 2A .
  • the authentication server 120 determines that it needs to query the supplicant about whether a certificate or a key pair has been requested in the response of block 214 .
  • the determination of block 502 can occur when the client does not use a certificate to authenticate the authentication server 120 as part of the response of block 214 .
  • the authentication server 120 sends a response message that prompts the supplicant to specify whether it is requesting a certificate or a key pair.
  • the request is packaged in a protected TLV of the response message.
  • the supplicant verifies the protected TLV of the response message, and determines that a certificate request is appropriate, at block 508 .
  • the supplicant issues a request for a certificate at block 510 in the form of a response message.
  • the authentication server contacts a certificate authority to obtain a digital certificate for the supplicant.
  • the certificate is sent to the supplicant as part of a response message at block 514 .
  • the message of block 514 returns the certificate in a protected TLV attribute within an encrypted AT_ENC attribute to protect the privacy of the identity in the certificate.
  • a message authentication code is also provided.
  • the supplicant Upon receiving the encrypted certificate, the supplicant verifies the message authentication code in the manner indicated above for other verification. If verification is successful, then a success indication is sent to the authentication server, as indicated by block 516 . The authentication server acknowledges success with a response message at block 316 .
  • FIG. 6 is a block diagram that illustrates a computer system 600 upon which an embodiment of the invention may be implemented.
  • Computer system 600 includes a bus 602 or other communication mechanism for communicating information, and a processor 604 coupled with bus 602 for processing information.
  • Computer system 600 also includes a main memory 606 , such as a random access memory (“RAM”) or other dynamic storage device, coupled to bus 602 for storing information and instructions to be executed by processor 604 .
  • Main memory 606 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 604 .
  • Computer system 600 further includes a read only memory (“ROM”) 608 or other static storage device coupled to bus 602 for storing static information and instructions for processor 604 .
  • ROM read only memory
  • a storage device 610 such as a magnetic disk or optical disk, is provided and coupled to bus 602 for storing information and instructions.
  • Computer system 600 may be coupled via bus 602 to a display 612 , such as a cathode ray tube (“CRT”), for displaying information to a computer user.
  • a display 612 such as a cathode ray tube (“CRT”)
  • An input device 614 is coupled to bus 602 for communicating information and command selections to processor 604 .
  • cursor control 616 is Another type of user input device
  • cursor control 616 such as a mouse, trackball, stylus, or cursor direction keys for communicating direction information and command selections to processor 604 and for controlling cursor movement on display 612 .
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • the invention is related to the use of computer system 600 for communicating credential information within a network device authentication conversation.
  • communicating credential information within a network device authentication conversation is provided by computer system 600 in response to processor 604 executing one or more sequences of one or more instructions contained in main memory 606 .
  • Such instructions may be read into main memory 606 from another computer-readable medium, such as storage device 610 .
  • Execution of the sequences of instructions contained in main memory 606 causes processor 604 to perform the process steps described herein.
  • hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
  • embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • Non-volatile media includes, for example, optical or magnetic disks, such as storage device 610 .
  • Volatile media includes dynamic memory, such as main memory 606 .
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 602 . Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
  • Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 604 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
  • a modem local to computer system 600 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal.
  • An infrared detector can receive the data carried in the infrared signal and appropriate circuitry can place the data on bus 602 .
  • Bus 602 carries the data to main memory 606 , from which processor 604 retrieves and executes the instructions.
  • the instructions received by main memory 606 may optionally be stored on storage device 610 either before or after execution by processor 604 .
  • Computer system 600 also includes a communication interface 618 coupled to bus 602 .
  • Communication interface 618 provides a two-way data communication coupling to a network link 620 that is connected to a local network 622 .
  • communication interface 618 may be an integrated services digital network (“ISDN”) card or a modem to provide a data communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • communication interface 618 may be a local area network (“LAN”) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • communication interface 618 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 620 typically provides data communication through one or more networks to other data devices.
  • network link 620 may provide a connection through local network 622 to a host computer 624 or to data equipment operated by an Internet Service Provider (“ISP”) 626 .
  • ISP 626 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the “Internet” 628 .
  • Internet 628 uses electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 620 and through communication interface 618 which carry the digital data to and from computer system 600 , are exemplary forms of carrier waves transporting the information.
  • Computer system 600 can send messages and receive data, including program code, through the network(s), network link 620 and communication interface 618 .
  • a server 630 might transmit a requested code for an application program through Internet 628 , ISP 626 , local network 622 and communication interface 618 .
  • One such downloaded application provides for communicating credential information within a network device authentication conversation as described herein.
  • Processor 604 may execute the received code as it is received, and/or stored in storage device 610 , or other non-volatile storage for later execution. In this manner, computer system 600 may obtain application code in the form of a carrier wave.

Abstract

A method is disclosed for communicating a security credential within a network device authentication conversation. An authenticator that is coupled to a supplicant through a network performs a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant. A second message conversation is initiated. The second message conversation is cryptographically protected using the same security context. A security credential is provided to the supplicant in the second message conversation. The second message conversation and first message conversation are then concluded. Specific embodiments can bootstrap digital certificates, public/private key pairs, and other credentials to supplicants, in-band, within an EAP-SIM or EAP-AKA conversation and without initiating a new session or exchanging special-purpose keys to protect distribution of the credentials.

Description

FIELD OF THE INVENTION
The present invention generally relates to computer network security and authentication. The invention relates more specifically to a method and apparatus for communicating credential information within a network device authentication conversation.
BACKGROUND OF THE INVENTION
The approaches described in this section could be pursued, but are not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated herein, the approaches described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
Distributing security credential information for use in verifying and proving the identity of a computer network device is a problem in the fields of network and information security. For example, in cryptosystems that use public key cryptography, there is a need to verify that a public key actually belongs to its purported owner, so that the public key can be trusted. One approach for establishing such trust is to use a root digital certificate to sign the key prior to distribution. For a recipient to then verify the signed key, the recipient must first receive the root certificate in some manner. Thus, examples of credentials for which distribution is commonly needed include public key-private key pairs, digital certificates such as server root certificates and public key certificates, and other material.
Certain packet-switched networks use authentication servers to authenticate clients that request access to protected resources, including end station devices such as servers and printers, and other infrastructure elements such as routers or switches. In this context, a requesting client may wish to receive a credential, such as a digital certificate, to verify an authentication server. Alternative, the client may need to receive its own certificate to use to prove its own identity to another domain. For example, a client may receive a digital certificate from an enterprise domain and then use that certificate to sign communications to other domains. As still another example, there may be a need to distribute a public/private key pair to a device that cannot otherwise perform a key exchange.
Typically, a subscriber and a peer communicate in a non-secure conversation, and the credentials are distributed manually through a separate, out-of-band process that is typically secured using encryption. However, this approach suffers from the drawbacks that a separate out-of-band process must be established and agreed upon by the peers; encryption keys must be exchanged among the peers in some manner; and the existence of a separate channel creates a new opportunity for attack or exploitation by a malicious interloper.
Thus, there is a need for a way to distribute credentials to a subscriber automatically through an in-band process. It would be particularly desirable to have a way to distribute the credentials within the context of an existing secure conversation between the subscriber and peer.
An authentication approach for network devices is described in L. Blunk et al., “PPP Extensible Authentication Protocol,” IETF Request for Comments 2284, March 1998. The “EAP” approach of RFC 2284 provides a generalized way for a first network element to authenticate the identity of a second network element.
EAP implementations have been developed for many specific contexts. For example, in the context of mobile wireless devices that use the Global System for Mobile communications (GSM), an approach for authentication and deriving session keys using the GSM Subscriber Identity Module (SIM) is described in H. Haverinen et al., “EAP SIM Authentication,” IETF Internet-Draft, February 2003. In these contexts, EAP generally results in exchanging authentication credentials, and may include a key exchange in which peers acquire keys needed to decipher packets sent under a link layer protocol, such as IEEE 802.11.
Because EAP implementations are widely used, it would be desirable to have a way to distribute security credentials within the context of an EAP authentication conversation. The credentials then could be used for protecting the identity of a subscriber, authenticating additional security services, and upgrading security credentials.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
FIG. 1A is a block diagram that illustrates an overview of a network context in which an embodiment may be implemented;
FIG. 1B is a flow diagram that illustrates a high level overview of a process of communicating a security credential within a network device authentication conversation;
FIG. 2A and FIG. 2B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a root certificate or certificate fingerprint that can be used to verify the identity of one or more entities;
FIG. 2C is a diagram that illustrates a variation of the conversation of FIG. 2A, FIG. 2B, in which a generic EAP-Method is used and the authentication server is configured to send a root certificate in a protected type-length-value attribute;
FIG. 3A and FIG. 3B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a private/public key pair and public key certificate to the supplicant;
FIG. 4A and FIG. 4B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request a public key certificate based on an existing public-private key pair and to retrieve a certificate;
FIG. 5A and FIG. 5B are diagrams that illustrate a variation of the message conversation of FIG. 4A, FIG. 4B, wherein the authenticator queries the supplicant to determine whether a certificate or key pair is needed;
FIG. 6 is a block diagram that illustrates a computer system upon which an embodiment may be implemented.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
A method and apparatus for communicating credential information within a network device authentication conversation is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
Embodiments are described herein according to the following outline:
    • 1.0 General Overview
    • 2.0 Structural and Functional Overview
    • 3.0 Method of Communication Security Credentials
    • 4.0 Implementation Mechanisms—Hardware Overview
    • 5.0 Extensions and Alternatives
      1.0 General Overview
The needs identified in the foregoing Background, and other needs and objects that will become apparent for the following description, are achieved in the present invention, which comprises, in one aspect, a method for communicating a security credential within a network device authentication conversation. An authenticator that is communicatively coupled to a supplicant through a network performs a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant. A second message conversation is initiated between the authenticator and the supplicant. The second message conversation is cryptographically protected using the same security context that was created in the first message conversation. A security credential is provided to the supplicant in the second message conversation. The second message conversation and first message conversation are then concluded. The first message conversation and the second message conversation are for granting initial network access.
Specific embodiments can bootstrap digital certificates, public/private key pairs, and other credentials to supplicants, in-band, within the context of an EAP-SIM or EAP-AKA conversation, without initiating a new session or exchanging special-purpose keys to protect distribution of the credentials.
In other aspects, the invention encompasses a computer apparatus and a computer-readable medium configured to carry out the foregoing steps.
In one aspect, the present approach provides a method for using EAP-SIM and EAP-AKA to bootstrap certificates or public key pairs into a supplicant. The method may be generalized to other EAP mechanisms based on different security associations. The method can use existing GSM security relationships to verify and bootstrap public key credentials.
The present approach allows credentials to be distributed in band. The credentials can then be used for protecting the identity of the subscriber, authenticating additional security services and upgrading security credentials.
In this mechanism it is assumed that a network subscriber already has credentials to participate in a GSM network using SIM or USIM credentials, such that the subscriber can use EAP-SIM or EAP-AKA authentication. During EAP-SIM and EAP-AKA authentication, a short-term security context is created, which can be used to protect data within the EAP-SIM/AKA transaction and the subsequent session.
In one feature, an embodiment includes a protected attribute to request and an attribute to distribute a root certificate or certificate fingerprint that can be used to verify the identity of one or more entities. This attribute is authenticated, but not necessarily encrypted. In another feature, an embodiment provides an attribute to request and an attribute to distribute a private/public key pair and public key certificate to the supplicant. In another feature, an embodiment provides an attribute to request a public key certificate based on an existing public/private key pair, and to retrieve a certificate. In yet another feature, an embodiment provides an attribute that can be used to verify the endpoint of an encapsulating security protocol that uses public key credentials to authenticate the endpoint, such as PEAP or TTLS.
Embodiments may be used in EAP-compatible authentication servers, such as RADIUS AAA servers, and in 802.1X WLAN EAP supplicants. Embodiments are useful in public wireless LAN environments that make use of GSM credentials.
The disclosed approaches offer numerous improvements over past approaches. For example, in the approaches herein, a supplicant or other client obtains a security credential early in a session. Further, credentials acquired in a first key exchange are used to protect a second exchange, without initiating a separate session, and without otherwise distributing credentials specifically for use in the second exchange.
2.0 Structural and Functional Overview
FIG. 1A is a block diagram that illustrates an overview of a network context in which an embodiment may be implemented. A wireless network device 102 is communicatively coupled wirelessly to a wireless access point 109, which is coupled to a wireless packet network 106. Typically, device 102 is an end station such as a personal computer, personal digital assistant, cellular radiotelephone, etc. In an authentication conversation as further described, device 102 has the role of Supplicant to an Authenticator. Device 102 has an identity verification module 103, comprising electronic hardware, firmware, or a combination, and which enables network 106 or WAP 109 to verify the identity of the device.
Network 106 is any network that can support communication with mobile wireless devices. Typically network 106 is a packet network. In one embodiment, network 106 is a digital wireless packet network that conforms to the IEEE 802.11 standards. In this embodiment, the identity verification module 103 of device 102 is a Subscriber Identity Module (SIM). Optionally, module 103 can execute the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism, which is based on symmetric keys.
Collectively the wireless device network 106, WAP 109 and device 102 reside in a public or semi-public network. Network 106 is communicatively coupled to an enterprise network 130 through an edge router 104 and firewall 110. In authentication conversations, WAP 109 typically acts as Authenticator; however, edge router 104 also may serve as an authenticator. The WAP 109 may be granting access to the Internet at a large enterprise or other enterprise. One or more content servers 112A, 112B form part of enterprise network 130, and contain application programs, data or other content of interest to the device 102.
An authentication server 120 is coupled to edge router 104 and stores one or more digital certificates 122A, 122B. The authentication server 120 communicates with edge router 104 using an authentication protocols such as Remove Access Dial-In User Service (RADIUS) or TACACS+. Either the edge router 104 or authentication server 120 has an interface to the wireless device network 106 and can request information from infrastructure elements of that network.
In this arrangement, wireless device 102 can authenticate itself to WAP 109 in an EAP conversation termed EAP over LAN or EAPOL; the WAP and authentication server 120 communicate EAP messages using EAP over RADIUS or an equivalent protocol. When device 102 initially attempts access to a server, such as server 112A, WAP 109 blocks port access to the network 106; if the device authenticates successfully, then port access is opened.
The elements of FIG. 1A are arranged in an example embodiment that includes a limited number of functional elements, for purposes of illustrating a clear example. In alternative embodiments and practical implementations, there may be any number of such elements, and the elements may be arranged in an alternative manner. For example, authentication server 120 may be coupled to a router of enterprise network 130 other than an edge router 104. Further, there may be any number of devices 102 and servers 112A, 112B. Also, edge router 104 may act as a gateway between network 106 and LAN 130. Edge router 104 may be a switch, bridge or relay.
FIG. 1B is a flow diagram of a process of communicating a security credential within a network device authentication conversation. The process of FIG. 1B can be performed in the network context of FIG. 1A, or in other contexts.
In block 150 an authenticator, which is communicatively coupled to a supplicant through a network, performs a first message conversation. As a result, a security context that is known to the authenticator and the supplicant is created, as shown in block 151. As part of performing the steps of block 150, a first authentication conversation is initiated. For example, a server or other that permits access only by authenticated clients may receive a request for access from a non-authenticated client. In response, the server initiates a message conversation directed at determining whether the server can authenticate the identity of the client. The server receives a client identifier from the client. The client identifier uniquely identifies the client. For example, when the client is a mobile wireless device operating in a GSM network, the identifying information could be the user's International Mobile Subscriber Identity (IMSI) value or a temporary identity value.
Further, the server may contact a trusted network infrastructure element, provide the device identifying information, and request corresponding authentication information. For example, when the client is a mobile wireless device operating in a GSM network, the server contacts the user's home operator's Authentication Centre and requests one or more GSM triplets. The server also generates one or more encryption keys for selective use in encrypting subsequent communications with the client. The keys are generated based on the authentication information, such as the GSM triplets.
In block 152, a second message conversation is initiated between the authenticator and the supplicant. The second message conversation is cryptographically protected using the same security context that was created in the first message conversation.
As part of block 152, the server can generate and send a message that challenges the client to prove that it is trusted. Further, the server can receive a request to provide validation information that validates the identity of the server. For purposes of illustrating a clear example, the following description assumes that the validation information comprises a digital certificate. However, in other embodiments the validation information could comprise any other useful information. Further, the request may seek information other than validation information, such as public-private key pairs, public key certificates, etc.
In block 154, a security credential is provided to the supplicant in the second message conversation. As part of block 154, for example, the server retrieves a copy of its digital certificate, computes a message authentication code (MAC) over the digital certificate, and sends the certificate and MAC to the client. The MAC may be computed as a hashed MAC using the SHA-1 algorithm, MD-5 algorithm, or any other suitable message authentication or message digest process.
The second message conversation and first message conversation are then concluded, in block 156. As part of block 156, in one embodiment, the server receives a message from the client indicating that the MAC was successfully verified. Thus, the client may verify the MAC by re-computing its own MAC over the received digital certificate, and comparing the computed MAC to the MAC that it received. If a match occurs, the message is verified.
As a result, within a first authentication conversation between a client and server, a digital certificate or other security credential information is exchanged without requiring a separate secure communication channel. The foregoing general process is adaptable to many specific contexts, some of which are now described.
3.0 Method of Communicating Security Credentials
FIG. 2A and FIG. 2B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a root certificate or certificate fingerprint that can be used to verify the identity of one or more entities. FIG. 2A and FIG. 2B show a message conversation that may be used in the context of EAP-SIM authentication, as described in Haverinen et al., cited above. Alternatively, other embodiments may use EAP-AKA authentication, which is described in J. Arkko, “EAP AKA Authentication,” February 2003, available at the time of this writing in the document draft-arkko-pppext-eap-aka-09.txt, in directory Internet-Drafts of the IETF.org domain on the World Wide Web.
Referring first to FIG. 2A, a supplicant 102, such as wireless device 102 of FIG. 1A, initiates the conversation by sending an EAP over LAN (“EAPOL”) Start message 202 to WAP 109. Typically, EAPOL-Start message 202 is sent by supplicant 102 after the supplicant seeks to access a protected resource and receives a response indicating that access is denied.
The authenticator 109, which may be an edge router, firewall, gateway, or server, then issues an EAP-Request message 204 with subtype Identity. As in conventional EAP-SIM authentication, message 204 operates as a request for the supplicant to identify itself. In response, supplicant 102 sends an EAP-Response message 206 with subtype Identity, and includes identifying information in a message attribute. For example, when the client is a mobile wireless device operating in a GSM network, the identifying information could be the user's International Mobile Subscriber Identity (IMSI) value or a temporary identity value. The message 206 is passed or forwarded to authentication server 120 by authenticator 109. However, a separate identity exchange is not always required for EAP-SIM and AKA.
Message 208 and message 210 represent a negotiation of a version of the EAP-SIM protocol between the supplicant 102 and the authentication server 120. In one embodiment, after receiving client identity information in message 206, authentication server 120 creates a list of EAP-SIM versions that it supports and provides the list as part of EAP-Request/SIM/Start message 208. In response, the supplicant 102 selects a version that it can support, and provides a value identifying the selected version in the EAP-Response/SIM/Start message 210.
Using message 212, authentication server 120 challenges the supplicant 102 to prove that it is the client that was identified using the identity information provided in message 206. For example, authentication server 120 obtains one or more GSM triplets from the user's home operator's Authentication Centre in wireless device network 106. Typically one, two, or three triplets are obtained. From the triplets, the authentication server derives keys, in the manner specified in Haverinen et al. The authentication server 120 then sends an EAP-Request/SIM/Challenge message to supplicant 102 that includes challenge values and a MAC covering the challenge values.
In response, supplicant 102 requests authentication server 120 to provide information that can verify the identity of the authentication server. For example, supplicant 102 sends an EAP-Response/SIM message 214 that includes both a Challenge attribute and an attribute requesting the authentication server 120 to distribute a root digital certificate to the supplicant. In one embodiment, Root-Cert-Distrib attribute indicates the request of the supplicant 102 for a digital certificate.
In block 218, the authentication server retrieves a copy of its root digital certificate, and generates a message authentication code based on the certificate. In block 220, the certificate is packaged in a message attribute. Referring now to FIG. 2B, the authentication server 120 sends a response message 224 to the supplicant 102, and provides the root certificate and authentication code. For example, authentication server 120 sends the message EAP-Response/SIM/Root-Cert-Distrib and includes an attribute indicating that it is responding with its root certificate (ROOT-CERT-RESP), an attribute containing the root certificate (ROOT-CERT), and the message authentication code covering the certificate (AT_MAC).
In block 226, the supplicant 102 attempts to verify the MAC that was received with the certificate. If the supplicant is able to verify the MAC, then the supplicant 102 sends a response message indicating success and proving knowledge of the MAC algorithm, such as EAP-Response/SIM/Root-Cert-Distrib with a SUCCESS attribute and MAC attribute. The authentication server indicates successful end to authentication with an EAP-Success message.
Thus, in the foregoing process the EAP-SIM authentication conversation of a supplicant and authenticator or authentication server is leveraged to provide substantially concurrent distribution of other security credentials, such as a digital certificate.
FIG. 2C is a diagram that illustrates a variation of the conversation of FIG. 2A, FIG. 2B, in which a generic EAP-Method is used and the authentication server is configured to send a root certificate in a protected EAP type-length-value (“TLV”) attribute. The process of FIG. 2C is appropriate when the authentication server needs to send a root certificate that the supplicant is not currently using. The use of EAP protected TLV attributes is described in J. Salowey, “Protected EAP TLV,” March 2003, available at the time of this writing in the document draft-salowey-eap-protectedtlv-01.txt at the internet-drafts directory of the IETF.org domain on the World Wide Web.
As indicated in FIG. 2C, a process using the steps of FIG. 2C begins by performing step 202 to step 210, inclusive, of FIG. 2A. Also as in FIG. 2A, authentication server 120 issues a challenge request in step 212. In response, in step 240, supplicant 102 issues a conventional response to the challenge request. The response does not include a request for a digital certificate of authentication server 120, but the authentication server is configured to know that it should deliver its root certificate in reply to such a response.
Accordingly, in block 242, authentication server 120 retrieves its digital certificate and packages the certificate in a protected TLV attribute. The protected TLV attribute is encrypted and contains a MAC. In block 244, the authentication server delivers the certificate by sending a response message that includes the certificate. For example, authentication server 120 sends an EAP-TLV Response message that includes an attribute identifying the response as a response that provides a root certificate, the root certificate itself, and a protected TLV that contains a separately encrypted version of the root certificate. Sending an encrypted version of the root certificate allows the supplicant 120 to verify that the certificate is authentic, without use of a separate MAC attribute value, by successfully decrypting the encrypted certificate.
In block 246, the protected TLV attribute is verified. In block 248, the supplicant issues a response indicating success, in the form of an EAP-TLV message. Authentication server 120 may then reply with a success message, as in block 230.
Also, an EAP-SUCCESS message may be used after the SIM phase of FIG. 2C is complete, such as in the case when the process of FIG. 2C is run outside a protected tunnel.
FIG. 3A and FIG. 3B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request and to distribute a private/public key pair and public key certificate to the supplicant. The process may be used to distribute only a certificate for an existing client key pair, or both the key pair and a certificate. Referring first to FIG. 3A, blocks 202 through 212, inclusive, involve messages that are communicated in the same manner and for the same purposes as for like numbered steps of FIG. 2A. In block 302, however, supplicant 120 sends a challenge response message that specifies a key request.
In response, in block 304, authentication server 120 generates a key pair and digital certificate. Block 304 may be performed by another entity in response to a separate request issued by the authentication server 120. Further, block 304 may involve retrieval of a key pair or certificate, or both, from a database, rather than generating the information. In block 306, the key pair and certificate are packaged in an EAP message attribute. In one embodiment, the public key from the key pair and the certificate are packaged in an encrypted attribute of the type identified as “AT_ENC” in RFCs covering EAP. Further, block 306 involves generating a message authentication code covering the entire response. In block 308, the authentication server 120 returns the encrypted key pair and digital certificate, with authentication code, to the supplicant 102 in an EAP response message.
Referring now to FIG. 3B, in block 309, an EAP-Response/SIM/Root-Cert-Distrib message is sent from the authentication server to the supplicant. In block 310, the supplicant 102 verifies the message attribute that contains the key pair and certificate. Verification typically involves generating a new message authentication code over the message attribute and determining if the new message authentication code matches the MAC received with the message.
If verification is successful, then in block 312, the public key is stored by the supplicant 102. Further, the supplicant 102 notifies the authentication server 120 that verification was successful, by sending a success response message in block 314. In one embodiment, the success response message also includes a MAC attribute for verification by the authentication server 120. In block 316, the authentication server acknowledges the success response.
As an alternative, a process equivalent to that of FIG. 3A, FIG. 3B may be performed by using a generic EAP-method with certain values packaged in an EAP protected TLV. In this alternative, block 202 to block 212 are performed as shown in FIG. 3A, FIG. 3B. At block 302, however, a generic EAP-Response/SIM/Challenge message is sent. Upon receiving such a message, authentication server 120 cannot know that the supplicant is specifically requesting a public key of a public-private key pair. Nevertheless, based on stored client profile information, the authentication server may determine that a key distribution is requested.
Therefore, the authentication server 120 generates or retrieves a key pair and certificate, and places the values in a protected TLV attribute. The values are returned to the supplicant in an EAP-Response message with the protected TLV attribute and that identifies the response as a key distribution message. The supplicant 102 verifies the protected TLV value, and responds with a Success message, which is acknowledged by the authentication server 120.
The method of FIG. 3A, FIG. 3B also may be used to authenticate an unauthenticated encapsulating PEAP tunnel. In particular, the EAP-Response/SIM/Root-Cert-Distrib attribute can be used to verify the identity of the endpoint of the encapsulating security protocol that uses public key credentials to for authentication, such as PEAP or TTLS. The public key or certificate chain that is used to establish the security in the encapsulating protocol must be certified by the certificate of the Root-Cert-Distrib attribute.
FIG. 4A and FIG. 4B are diagrams that illustrate a message conversation between a supplicant and an authenticator to request a public key certificate based on an existing public-private key pair and to retrieve a certificate. In the scenario represented by FIG. 4A, FIG. 4B, the supplicant 102 has the capability to generate its own public-private key pairs; therefore, the supplicant only needs to request a certificate. The certificates may be valid for a long period of time or a short period of time.
Referring first to FIG. 4A, blocks 202 to 214, inclusive, are performed as described above with respect to FIG. 2A. Block 214 involves presenting only a certificate request to the authentication server 120. The certificate request contains a standard certificate request, such as PKCS#10. In response, the authentication server 120 contacts a certificate authority, or other third party or element, to obtain a certificate for the supplicant. In block 404 the certificate received from the third party is packaged in a message attribute. In one specific embodiment, the certificate is packaged in an AT_CERT message attribute within an encrypted AT_ENC attribute to protect the privacy of the identity in the certificate. Referring now to FIG. 4B, a response message containing the encrypted attribute and a message authentication code is sent to the supplicant in block 406.
At block 408, the supplicant 102 verifies the message authentication code using the techniques described above for verification. If verification is successful, then in block 410 the certificate is stored. Further, in block 412 a response message indicating success is sent back to the authentication server 120. The authentication server acknowledges success with a responsive success message, as shown in block 316.
As an alternative, a process equivalent to that of FIG. 4A, FIG. 4B may be performed by using a generic EAP-method with certain values packaged in an EAP protected TLV. However, in this alternative, the server cannot respond proactively, because it does not have sufficient information associated with or in the certificate request. Therefore, the authentication server needs to request additional information from the supplicant. FIG. 5A and FIG. 5B are diagrams that illustrate a variation of the message conversation of FIG. 4A, FIG. 4B, wherein the authenticator queries the supplicant to determine whether a certificate or key pair is needed.
Referring first to FIG. 5A, block 202 to block 214 are performed in accordance with the description given above for like-numbered steps with respect to FIG. 2A. However, in block 502, the authentication server 120 determines that it needs to query the supplicant about whether a certificate or a key pair has been requested in the response of block 214. The determination of block 502 can occur when the client does not use a certificate to authenticate the authentication server 120 as part of the response of block 214. In block 504, the authentication server 120 sends a response message that prompts the supplicant to specify whether it is requesting a certificate or a key pair. In one specific embodiment, the request is packaged in a protected TLV of the response message.
In block 506, the supplicant verifies the protected TLV of the response message, and determines that a certificate request is appropriate, at block 508. The supplicant issues a request for a certificate at block 510 in the form of a response message.
In block 512, the authentication server contacts a certificate authority to obtain a digital certificate for the supplicant. The certificate is sent to the supplicant as part of a response message at block 514. In one specific embodiment, the message of block 514 returns the certificate in a protected TLV attribute within an encrypted AT_ENC attribute to protect the privacy of the identity in the certificate. A message authentication code is also provided.
Upon receiving the encrypted certificate, the supplicant verifies the message authentication code in the manner indicated above for other verification. If verification is successful, then a success indication is sent to the authentication server, as indicated by block 516. The authentication server acknowledges success with a response message at block 316.
4.0 Implementation Mechanisms—Hardware Overview
FIG. 6 is a block diagram that illustrates a computer system 600 upon which an embodiment of the invention may be implemented. Computer system 600 includes a bus 602 or other communication mechanism for communicating information, and a processor 604 coupled with bus 602 for processing information. Computer system 600 also includes a main memory 606, such as a random access memory (“RAM”) or other dynamic storage device, coupled to bus 602 for storing information and instructions to be executed by processor 604. Main memory 606 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 604. Computer system 600 further includes a read only memory (“ROM”) 608 or other static storage device coupled to bus 602 for storing static information and instructions for processor 604. A storage device 610, such as a magnetic disk or optical disk, is provided and coupled to bus 602 for storing information and instructions.
Computer system 600 may be coupled via bus 602 to a display 612, such as a cathode ray tube (“CRT”), for displaying information to a computer user. An input device 614, including alphanumeric and other keys, is coupled to bus 602 for communicating information and command selections to processor 604. Another type of user input device is cursor control 616, such as a mouse, trackball, stylus, or cursor direction keys for communicating direction information and command selections to processor 604 and for controlling cursor movement on display 612. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
The invention is related to the use of computer system 600 for communicating credential information within a network device authentication conversation. According to one embodiment of the invention, communicating credential information within a network device authentication conversation is provided by computer system 600 in response to processor 604 executing one or more sequences of one or more instructions contained in main memory 606. Such instructions may be read into main memory 606 from another computer-readable medium, such as storage device 610. Execution of the sequences of instructions contained in main memory 606 causes processor 604 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
The term “computer-readable medium” as used herein refers to any medium that participates in providing instructions to processor 604 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 610. Volatile media includes dynamic memory, such as main memory 606. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 602. Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 604 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 600 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector can receive the data carried in the infrared signal and appropriate circuitry can place the data on bus 602. Bus 602 carries the data to main memory 606, from which processor 604 retrieves and executes the instructions. The instructions received by main memory 606 may optionally be stored on storage device 610 either before or after execution by processor 604.
Computer system 600 also includes a communication interface 618 coupled to bus 602. Communication interface 618 provides a two-way data communication coupling to a network link 620 that is connected to a local network 622. For example, communication interface 618 may be an integrated services digital network (“ISDN”) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 618 may be a local area network (“LAN”) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 618 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 620 typically provides data communication through one or more networks to other data devices. For example, network link 620 may provide a connection through local network 622 to a host computer 624 or to data equipment operated by an Internet Service Provider (“ISP”) 626. ISP 626 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the “Internet” 628. Local network 622 and Internet 628 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 620 and through communication interface 618, which carry the digital data to and from computer system 600, are exemplary forms of carrier waves transporting the information.
Computer system 600 can send messages and receive data, including program code, through the network(s), network link 620 and communication interface 618. In the Internet example, a server 630 might transmit a requested code for an application program through Internet 628, ISP 626, local network 622 and communication interface 618. One such downloaded application provides for communicating credential information within a network device authentication conversation as described herein.
Processor 604 may execute the received code as it is received, and/or stored in storage device 610, or other non-volatile storage for later execution. In this manner, computer system 600 may obtain application code in the form of a carrier wave.
5.0 Extensions and Alternatives
In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims (47)

1. A method of communicating a security credential within a network device authentication conversation, the method comprising the computer-implemented steps of:
performing, at an authenticator that is communicatively coupled to a supplicant through a network, a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant;
initiating a second message conversation between the authenticator and the supplicant, wherein the second message conversation is cryptographically protected using the same security context that was created in the first message conversation;
providing a security credential to the supplicant in the second message conversation;
concluding the second message conversation and the first message conversation;
wherein the first message conversation and the second message conversation are for granting initial network access.
2. A method as recited in claim 1 wherein the first message conversation is an EAP-SIM conversation.
3. A method as recited in claim 1, wherein the first message conversation is an EAP-AKA conversation.
4. A method as recited in claim 1, wherein the security credential is a root digital certificate of an authentication server associated with the authenticator.
5. A method as recited in claim 1, wherein the security credential is a public/private key pair for the supplicant.
6. A method as recited in claim 1, wherein the security credential is a digital certificate that is requested for the supplicant from a third party.
7. A method as recited in claim 1, wherein the security credential is provided to the supplicant in an EAP-Response message, wherein the EAP-Response message includes the security credential, and a message authentication code attribute containing a message authentication code that is generated based on the security credential.
8. A method as recited in claim 1, wherein the supplicant further performs the computer-implemented steps of:
sending an EAP response message that requests a digital certificate from an authentication server associated with the authenticator;
receiving an EAP response message that contains a digital certificate and a message authentication code based on the digital certificate;
verifying the message authentication code with respect to the digital certificate;
when verification is successful, sending an EAP response message that indicates successful verification.
9. A method as recited in claim 1, wherein the security credential is provided in a protected type-length-value (TLV) attribute of an EAP response message.
10. A method as recited in claim 1, wherein the second message conversation is initiated by the supplicant using a generic EAP-method, wherein the second message conversation further comprises issuing a query to the supplicant about whether a certificate or a key pair is requested, and wherein the second message conversation further comprises providing either a certificate or a key pair to the supplicant based on a response to the query.
11. A method of distributing a security credential to a network device within an extensible authentication protocol (EAP) authentication conversation, the method comprising the computer-implemented steps of:
performing, at an authenticator that is communicatively coupled to a supplicant through a network, an EAP-SIM message conversation resulting in creating a security context that is known to the authenticator and the supplicant;
during the EAP-SIM message conversation, receiving a request for the security credential, wherein the request is formatted as a first EAP message;
providing the security credential to the supplicant in a second EAP message, wherein the security credential is cryptographically protected using the security context;
providing to the supplicant in the second EAP message, verification information based on the security credential;
wherein the EAP-SIM message conversation is for granting initial network access.
12. A method as recited in claim 11, wherein the security credential is a root digital certificate of an authentication server associated with the authenticator.
13. A method as recited in claim 11, wherein the security credential is a public/private key pair for the supplicant.
14. A method as recited in claim 11, wherein the security credential is a digital certificate that is requested for the supplicant from a third party.
15. A method as recited in claim 11, wherein the first EAP message is an EAP-Response message, wherein the EAP-Response message includes the security credential, and a message authentication code attribute containing a message authentication code that is generated based on the security credential.
16. A method as recited in claim 11, wherein the supplicant further performs the computer-implemented steps of:
sending the first EAP message that requests a digital certificate from an authentication server associated with the authenticator;
receiving the second EAP message, which comprises a digital certificate and a message authentication code based on the digital certificate;
verifying the message authentication code with respect to the digital certificate;
when verification is successful, sending a third EAP message that indicates successful verification.
17. A method as recited in claim 11, wherein the security credential is provided in a protected type-length-value (TLV) attribute of an EAP response message.
18. A computer-readable medium carrying one or more sequences of instructions for communicating a security credential within a network device authentication conversation, which instructions, when executed by one or more processors, cause the one or more processors to carry out the steps of:
performing, at an authenticator that is communicatively coupled to a supplicant through a network, a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant;
initiating a second message conversation between the authenticator and the supplicant, wherein the second message conversation is cryptographically protected using the same security context that was created in the first message conversation;
providing a security credential to the supplicant in the second message conversation;
concluding the second message conversation and the first message conversation;
wherein the first message conversation and the second message conversation are for granting initial network access.
19. A computer-readable medium as recited in claim 18 wherein the first message conversation is an EAP-SIM conversation.
20. A computer-readable medium as recited in claim 18, wherein the first message conversation is an EAP-AKA conversation.
21. A computer-readable medium as recited in claim 18, wherein the security credential is a root digital certificate of an authentication server associated with the authenticator.
22. A computer-readable medium as recited in claim 18, wherein the security credential is a public/private key pair for the supplicant.
23. A computer-readable medium as recited in claim 18, wherein the security credential is a digital certificate that is requested for the supplicant from a third party.
24. A computer-readable medium as recited in claim 18, wherein the security credential is provided to the supplicant in an EAP-Response message, wherein the EAP-Response message includes the security credential, and a message authentication code attribute containing a message authentication code that is generated based on the security credential.
25. A computer-readable medium as recited in claim 18, further comprising instructions wherein the supplicant further performs the steps of:
sending an EAP response message that requests a digital certificate from an authentication server associated with the authenticator;
receiving an EAP response message that contains a digital certificate and a message authentication code based on the digital certificate;
verifying the message authentication code with respect to the digital certificate;
when verification is successful, sending an EAP response message that indicates successful verification.
26. A computer-readable medium as recited in claim 18, wherein the security credential is provided in a protected type-length-value (TLV) attribute of an EAP response message.
27. A computer-readable medium as recited in claim 18, wherein the second message conversation is initiated by the supplicant using a generic EAP-method, wherein the second message conversation further comprises issuing a query to the supplicant about whether a certificate or a key pair is requested, and wherein the second message conversation further comprises providing either a certificate or a key pair to the supplicant based on a response to the query.
28. An apparatus for communicating a security credential within a network device authentication conversation, comprising:
means for performing, at an authenticator that is communicatively coupled to a supplicant through a network, a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant;
means for initiating a second message conversation between the authenticator and the supplicant, wherein the second message conversation is cryptographically protected using the same security context that was created in the first message conversation;
means for providing a security credential to the supplicant in the second message conversation; and
means for concluding the second message conversation and the first message conversation;
wherein the first message conversation and the second message conversation are for granting initial network access.
29. An apparatus as recited in claim 28 wherein the first message conversation is an EAP-SIM conversation.
30. An apparatus as recited in claim 28, wherein the first message conversation is an EAP-AKA conversation.
31. An apparatus as recited in claim 28, wherein the security credential is a root digital certificate of an authentication server associated with the authenticator.
32. An apparatus as recited in claim 28, wherein the security credential is a public/private key pair for the supplicant.
33. An apparatus as recited in claim 28, wherein the security credential is a digital certificate that is requested for the supplicant from a third party.
34. An apparatus as recited in claim 28, wherein the security credential is provided to the supplicant in an EAP-Response message, wherein the EAP-Response message includes the security credential, and a message authentication code attribute containing a message authentication code that is generated based on the security credential.
35. An apparatus as recited in claim 28, wherein the supplicant further comprises:
means for sending an EAP response message that requests a digital certificate from an authentication server associated with the authenticator;
means for receiving an EAP response message that contains a digital certificate and a message authentication code based on the digital certificate;
means for verifying the message authentication code with respect to the digital certificate;
means for sending, when verification is successful, an EAP response message that indicates successful verification.
36. An apparatus as recited in claim 28, wherein the security credential is provided in a protected type-length-value (TLV) attribute of an EAP response message.
37. An apparatus as recited in claim 28, wherein the second message conversation is initiated by the supplicant using a generic EAP-method, wherein the second message conversation further comprises issuing a query to the supplicant about whether a certificate or a key pair is requested, and wherein the second message conversation further comprises providing either a certificate or a key pair to the supplicant based on a response to the query.
38. An apparatus for communicating a security credential within a network device authentication conversation, comprising:
a network interface that is coupled to the data network for receiving one or more packet flows therefrom;
a processor;
one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of:
performing, at an authenticator that is communicatively coupled to a supplicant through a network, a first message conversation resulting in creating a security context that is known to the authenticator and the supplicant;
initiating a second message conversation between the authenticator and the supplicant, wherein the second message conversation is cryptographically protected using the same security context that was created in the first message conversation;
providing a security credential to the supplicant in the second message conversation;
concluding the second message conversation and the first message conversation;
wherein the first message conversation and the second message conversation are for granting initial network access.
39. An apparatus as recited in claim 38 wherein the first message conversation is an EAP-SIM conversation.
40. An apparatus as recited in claim 38, wherein the first message conversation is an EAP-AKA conversation.
41. An apparatus as recited in claim 38, wherein the security credential is a root digital certificate of an authentication server associated with the authenticator.
42. An apparatus as recited in claim 38, wherein the security credential is a public/private key pair for the supplicant.
43. An apparatus as recited in claim 38, wherein the security credential is a digital certificate that is requested for the supplicant from a third party.
44. An apparatus as recited in claim 38, wherein the security credential is provided to the supplicant in an EAP-Response message, wherein the EAP-Response message includes the security credential, and a message authentication code attribute containing a message authentication code that is generated based on the security credential.
45. An apparatus as recited in claim 38, wherein the supplicant further performs the computer-implemented steps of:
sending an EAP response message that requests a digital certificate from an authentication server associated with the authenticator;
receiving an EAP response message that contains a digital certificate and a message authentication code based on the digital certificate;
verifying the message authentication code with respect to the digital certificate;
when verification is successful, sending an EAP response message that indicates successful verification.
46. An apparatus as recited in claim 38, wherein the security credential is provided in a protected type-length-value (TLV) attribute of an EAP response message.
47. An apparatus as recited in claim 38, wherein the second message conversation is initiated by the supplicant using a generic EAP-method, wherein the second message conversation further comprises issuing a query to the supplicant about whether a certificate or a key pair is requested, and wherein the second message conversation further comprises providing either a certificate or a key pair to the supplicant based on a response to the query.
US10/449,180 2003-05-29 2003-05-29 Method and apparatus for communicating credential information within a network device authentication conversation Expired - Fee Related US7171555B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/449,180 US7171555B1 (en) 2003-05-29 2003-05-29 Method and apparatus for communicating credential information within a network device authentication conversation
US11/651,742 US7793336B2 (en) 2003-05-29 2007-01-09 Method and apparatus for communicating credential information within a network device authentication conversation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/449,180 US7171555B1 (en) 2003-05-29 2003-05-29 Method and apparatus for communicating credential information within a network device authentication conversation

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/651,742 Continuation US7793336B2 (en) 2003-05-29 2007-01-09 Method and apparatus for communicating credential information within a network device authentication conversation

Publications (1)

Publication Number Publication Date
US7171555B1 true US7171555B1 (en) 2007-01-30

Family

ID=37682011

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/449,180 Expired - Fee Related US7171555B1 (en) 2003-05-29 2003-05-29 Method and apparatus for communicating credential information within a network device authentication conversation
US11/651,742 Active 2025-01-20 US7793336B2 (en) 2003-05-29 2007-01-09 Method and apparatus for communicating credential information within a network device authentication conversation

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/651,742 Active 2025-01-20 US7793336B2 (en) 2003-05-29 2007-01-09 Method and apparatus for communicating credential information within a network device authentication conversation

Country Status (1)

Country Link
US (2) US7171555B1 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050021979A1 (en) * 2003-06-05 2005-01-27 Ulrich Wiedmann Methods and systems of remote authentication for computer networks
US20050071687A1 (en) * 2003-09-30 2005-03-31 Novell, Inc. Techniques for securing electronic identities
US20050198489A1 (en) * 2003-12-24 2005-09-08 Apple Computer, Inc. Server computer issued credential authentication
US20050228893A1 (en) * 2004-04-08 2005-10-13 Vijay Devarapalli Method of configuring a mobile node
US20050246548A1 (en) * 2004-04-30 2005-11-03 Pekka Laitinen Method for verifying a first identity and a second identity of an entity
US20050289347A1 (en) * 2004-06-28 2005-12-29 Shlomo Ovadia Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks
US20060089123A1 (en) * 2004-10-22 2006-04-27 Frank Edward H Use of information on smartcards for authentication and encryption
US20060288406A1 (en) * 2005-06-16 2006-12-21 Mci, Inc. Extensible authentication protocol (EAP) state server
US20070118883A1 (en) * 2004-08-02 2007-05-24 Darran Potter Method and apparatus for determining authentication capabilities
US20070180229A1 (en) * 2003-05-29 2007-08-02 Joseph Salowey Method and apparatus for communicating credential information within a network device authentication conversation
US20070206515A1 (en) * 2006-03-06 2007-09-06 Andreasen Flemming S System and method for generating a unified accounting record for a communication session
US20070220589A1 (en) * 2006-03-17 2007-09-20 Cisco Technology, Inc. Techniques for validating public keys using AAA services
US20070217610A1 (en) * 2006-03-06 2007-09-20 Parviz Yegani System and Method for Access Authentication in a Mobile Wireless Network
US20070274266A1 (en) * 2003-06-18 2007-11-29 Johnson Oyama Method, System And Apparatus To Support Mobile Ip Version 6 Services in Cdma Systems
US20080046989A1 (en) * 2006-08-17 2008-02-21 Mark Frederick Wahl System and method for remote authentication security management
US20080063204A1 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Method and system for secure processing of authentication key material in an ad hoc wireless network
US20080063205A1 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Tunneling security association messages through a mesh network
US20080065884A1 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Method and apparatus for establishing security association between nodes of an ad hoc wireless network
US20080069105A1 (en) * 2004-06-24 2008-03-20 Telecom Italia S.P.A. Method and System for Controlling Access to Communication Networks, Related Network and Computer Program Therefor
US20080127317A1 (en) * 2006-11-27 2008-05-29 Futurewei Technologies, Inc. System for using an authorization token to separate authentication and authorization services
US20080168537A1 (en) * 2007-01-09 2008-07-10 Futurewei Technologies, Inc. Service Authorization for Distributed Authentication and Authorization Servers
US20080195861A1 (en) * 2007-02-09 2008-08-14 Research In Motion Limited Method and system for authenticating peer devices using eap
US7421266B1 (en) 2002-08-12 2008-09-02 Mcafee, Inc. Installation and configuration process for wireless network
US20080244262A1 (en) * 2007-03-30 2008-10-02 Intel Corporation Enhanced supplicant framework for wireless communications
US20080263647A1 (en) * 2006-07-21 2008-10-23 General Electric Company System and Method For Providing Network Device Authentication
US20090031138A1 (en) * 2007-05-14 2009-01-29 Futurewei Technologies, Inc. Method and system for authentication confirmation using extensible authentication protocol
US7568107B1 (en) * 2003-08-20 2009-07-28 Extreme Networks, Inc. Method and system for auto discovery of authenticator for network login
US20090271851A1 (en) * 2008-04-25 2009-10-29 Sally Blue Hoppe System and Method for Installing Authentication Credentials on a Remote Network Device
US20090271850A1 (en) * 2008-04-25 2009-10-29 Sally Blue Hoppe System and Method for installing Authentication Credentials On a Network Device
US20090271852A1 (en) * 2008-04-25 2009-10-29 Matt Torres System and Method for Distributing Enduring Credentials in an Untrusted Network Environment
US20100051686A1 (en) * 2008-08-29 2010-03-04 Covenant Visions International Limited System and method for authenticating a transaction using a one-time pass code (OTPK)
US20100064341A1 (en) * 2006-03-27 2010-03-11 Carlo Aldera System for Enforcing Security Policies on Mobile Communications Devices
EP2171911A2 (en) * 2007-06-25 2010-04-07 Microsoft Corporation Device provisioning and domain join emulation over non-secured networks
US20100325427A1 (en) * 2009-06-22 2010-12-23 Nokia Corporation Method and apparatus for authenticating a mobile device
US20120017098A1 (en) * 2010-07-14 2012-01-19 Phillip Martin Hallam-Baker Computer Memory With Cryptographic Content Authentication
AU2009222577B2 (en) * 2008-09-30 2012-05-17 Aristocrat Technologies Australia Pty Limited A security method
US20130007850A1 (en) * 2011-06-30 2013-01-03 Lambert Paul A Verifying Server Identity
US20130084556A1 (en) * 2011-09-30 2013-04-04 Paul Giampavolo System and method for simulating goods in bulk
US8578465B2 (en) 2009-07-21 2013-11-05 Cisco Technology, Inc. Token-based control of permitted sub-sessions for online collaborative computing sessions
US8751647B1 (en) 2001-06-30 2014-06-10 Extreme Networks Method and apparatus for network login authorization
US8800010B2 (en) 2012-04-20 2014-08-05 Cisco Technology, Inc. Distributed group temporal key (GTK) state management
US9077772B2 (en) 2012-04-20 2015-07-07 Cisco Technology, Inc. Scalable replay counters for network security
US20180013571A1 (en) * 2016-07-05 2018-01-11 General Electric Company Method for authenticating devices in a medical network
US10110595B2 (en) 2015-03-16 2018-10-23 Convida Wireless, Llc End-to-end authentication at the service layer using public keying mechanisms
US10129031B2 (en) * 2014-10-31 2018-11-13 Convida Wireless, Llc End-to-end service layer authentication
US10904368B2 (en) * 2016-11-26 2021-01-26 Huawei Technologies Co., Ltd. System, method and devices for MKA negotiation between the devices
US11246032B1 (en) * 2020-10-29 2022-02-08 Motional Ad Llc Device provisioning and authentication

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8274401B2 (en) * 2006-12-22 2012-09-25 Acterna Llc Secure data transfer in a communication system including portable meters
CN101681402A (en) * 2007-06-11 2010-03-24 艾利森电话股份有限公司 Method and arrangement for certificate handling
US8327143B2 (en) * 2008-08-04 2012-12-04 Broadcom Corporation Techniques to provide access point authentication for wireless network
KR101560416B1 (en) * 2009-11-18 2015-10-14 삼성전자주식회사 Secure channel establishment method and apparatus in short range communication
CA2789291A1 (en) * 2010-02-26 2011-09-01 General Instrument Corporation Dynamic cryptographic subscriber-device identity binding for subscriber mobility
US9209977B2 (en) * 2012-04-11 2015-12-08 General Motors Llc Processing messages received at a vehicle
US9197498B2 (en) 2012-08-31 2015-11-24 Cisco Technology, Inc. Method for automatically applying access control policies based on device types of networked computing devices
BR112016002054B1 (en) * 2013-07-31 2022-09-06 Hewlett-Packard Development Company, L.P. NON-TRANSITORY MEMORY STORING A DIGITAL SIGNATURE, PRINT CARTRIDGE, AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIA
DE102015211345A1 (en) * 2015-06-19 2016-12-22 Siemens Aktiengesellschaft Network device and method for accessing a network component to a data network
CN113330765A (en) * 2019-01-29 2021-08-31 施耐德电气美国股份有限公司 Secure context distribution service
US11943619B2 (en) * 2020-10-29 2024-03-26 Cisco Technology, Inc. Openroaming augmentation method for EAP failures

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5586260A (en) * 1993-02-12 1996-12-17 Digital Equipment Corporation Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
US6256733B1 (en) * 1998-10-08 2001-07-03 Entrust Technologies Limited Access and storage of secure group communication cryptographic keys
US6732277B1 (en) * 1998-10-08 2004-05-04 Entrust Technologies Ltd. Method and apparatus for dynamically accessing security credentials and related information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6178409B1 (en) * 1996-06-17 2001-01-23 Verifone, Inc. System, method and article of manufacture for multiple-entry point virtual point of sale architecture
US7171555B1 (en) * 2003-05-29 2007-01-30 Cisco Technology, Inc. Method and apparatus for communicating credential information within a network device authentication conversation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5586260A (en) * 1993-02-12 1996-12-17 Digital Equipment Corporation Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
US6256733B1 (en) * 1998-10-08 2001-07-03 Entrust Technologies Limited Access and storage of secure group communication cryptographic keys
US6732277B1 (en) * 1998-10-08 2004-05-04 Entrust Technologies Ltd. Method and apparatus for dynamically accessing security credentials and related information

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
H. Haverinen, et al., "EAP SIM Authentication, draft-haverinen-pppext-eap-sim-10.txt," Point-to-Point Extensions Working Group, Internet Daft, Feb. 2003, pp. 1-58.
J. Salowey, "Protected EAP TLV," Network Working Group, Internet Draft, Mar. 2003, pp. 1-8.
L. Blunk, et al., "PPP Extensible Authentication Protocol (EAP)," Network Working Group, Request for Comments: 2284, Mar. 1998, pp. 1-15.
Miikka Poikselkä, "LS on subscriber certificates," 3GPP TSG-SA WG2 Meeting #27, Beijing, China, Oct. 14-18, 2002, Tdoc S2-023130, 9 pages.
Nokia, "Comments on S3-020500 'Contribution to discussion on architecture and trust for subscriber certificates,'" Nov. 8, 2002, 3GPP TSG SA WG3 Security-S3#26, Nov. 19-22, 2002, Oxford, UK, S3-020605, 6 pages.
Siemens, "Bootstrapping for subscriber certificates," 3GPP TSG SA WG3 Security-S3#26, Nov. 19-22, 2002, Oxford, UK, S3-020636, pp. 1-4.

Cited By (107)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8751647B1 (en) 2001-06-30 2014-06-10 Extreme Networks Method and apparatus for network login authorization
US7421266B1 (en) 2002-08-12 2008-09-02 Mcafee, Inc. Installation and configuration process for wireless network
US20070180229A1 (en) * 2003-05-29 2007-08-02 Joseph Salowey Method and apparatus for communicating credential information within a network device authentication conversation
US7793336B2 (en) * 2003-05-29 2010-09-07 Cisco Technology, Inc. Method and apparatus for communicating credential information within a network device authentication conversation
US20050021979A1 (en) * 2003-06-05 2005-01-27 Ulrich Wiedmann Methods and systems of remote authentication for computer networks
US7673146B2 (en) * 2003-06-05 2010-03-02 Mcafee, Inc. Methods and systems of remote authentication for computer networks
US20070274266A1 (en) * 2003-06-18 2007-11-29 Johnson Oyama Method, System And Apparatus To Support Mobile Ip Version 6 Services in Cdma Systems
US7568107B1 (en) * 2003-08-20 2009-07-28 Extreme Networks, Inc. Method and system for auto discovery of authenticator for network login
US7770204B2 (en) * 2003-09-30 2010-08-03 Novell, Inc. Techniques for securing electronic identities
US20050071687A1 (en) * 2003-09-30 2005-03-31 Novell, Inc. Techniques for securing electronic identities
US20100299729A1 (en) * 2003-12-24 2010-11-25 Apple Inc. Server Computer Issued Credential Authentication
US7735120B2 (en) * 2003-12-24 2010-06-08 Apple Inc. Server computer issued credential authentication
US20050198489A1 (en) * 2003-12-24 2005-09-08 Apple Computer, Inc. Server computer issued credential authentication
US20050228893A1 (en) * 2004-04-08 2005-10-13 Vijay Devarapalli Method of configuring a mobile node
US9686669B2 (en) * 2004-04-08 2017-06-20 Nokia Technologies Oy Method of configuring a mobile node
US8107623B2 (en) * 2004-04-30 2012-01-31 Nokia Corporation Method for verifying a first identity and a second identity of an entity
US20050246548A1 (en) * 2004-04-30 2005-11-03 Pekka Laitinen Method for verifying a first identity and a second identity of an entity
US8561200B2 (en) * 2004-06-24 2013-10-15 Telecom Italia S.P.A. Method and system for controlling access to communication networks, related network and computer program therefor
US20080069105A1 (en) * 2004-06-24 2008-03-20 Telecom Italia S.P.A. Method and System for Controlling Access to Communication Networks, Related Network and Computer Program Therefor
US20050289347A1 (en) * 2004-06-28 2005-12-29 Shlomo Ovadia Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks
US7747862B2 (en) * 2004-06-28 2010-06-29 Intel Corporation Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks
US8555340B2 (en) * 2004-08-02 2013-10-08 Cisco Technology, Inc. Method and apparatus for determining authentication capabilities
US20070118883A1 (en) * 2004-08-02 2007-05-24 Darran Potter Method and apparatus for determining authentication capabilities
US20060089123A1 (en) * 2004-10-22 2006-04-27 Frank Edward H Use of information on smartcards for authentication and encryption
US20060288406A1 (en) * 2005-06-16 2006-12-21 Mci, Inc. Extensible authentication protocol (EAP) state server
US7716724B2 (en) * 2005-06-16 2010-05-11 Verizon Business Global Llc Extensible authentication protocol (EAP) state server
US7912035B1 (en) 2006-03-06 2011-03-22 Cisco Technology, Inc. Communicating packets using a home anchored bearer path or a visited anchored bearer path
US7936722B2 (en) 2006-03-06 2011-05-03 Cisco Technology, Inc. System and method for handover of an access terminal in a communication network
US20070206617A1 (en) * 2006-03-06 2007-09-06 Andreasen Flemming S Network-triggered quality of service (QoS) reservation
US8719895B1 (en) 2006-03-06 2014-05-06 Cisco Technology, Inc. Determining a policy output for a communication session
US20070207818A1 (en) * 2006-03-06 2007-09-06 Rosenberg Jonathan D System and method for exchanging policy information in a roaming communications environment
US8045959B1 (en) 2006-03-06 2011-10-25 Cisco Technology, Inc. Assigning a serving-CSCF during access authentication
US8040862B1 (en) 2006-03-06 2011-10-18 Cisco Technology, Inc. System and method for providing emergency services in a visited communications environment
US8041022B1 (en) 2006-03-06 2011-10-18 Cisco Technology, Inc. Policy-based control of content intercept
US8050391B1 (en) 2006-03-06 2011-11-01 Cisco Technology, Inc. System and method for capturing accounting data for a communication session
US20070206539A1 (en) * 2006-03-06 2007-09-06 Parviz Yegani System and method for handover of an access terminal in a communication network
US7995990B1 (en) 2006-03-06 2011-08-09 Cisco Technology, Inc. System and method for consolidating accounting data for a communication session
US8438613B2 (en) 2006-03-06 2013-05-07 Cisco Technology, Inc. Establishing facets of a policy for a communication session
US7991385B1 (en) 2006-03-06 2011-08-02 Cisco Technology, Inc. System and method for network charging using policy peering
US20070206557A1 (en) * 2006-03-06 2007-09-06 Iyer Jayaraman R Access terminal for communicating packets using a home anchored bearer path or a visited anchored bearer path
US8295242B2 (en) 2006-03-06 2012-10-23 Cisco Technology, Inc. System and method for exchanging policy information in a roaming communications environment
US7966645B2 (en) 2006-03-06 2011-06-21 Cisco Technology, Inc. Application-aware policy enforcement
US8160579B1 (en) 2006-03-06 2012-04-17 Cisco Technology, Inc. Performing deep packet inspection for a communication session
US7962123B1 (en) 2006-03-06 2011-06-14 Cisco Technology, Inc. Authentication of access terminals in a cellular communication network
US7715562B2 (en) 2006-03-06 2010-05-11 Cisco Technology, Inc. System and method for access authentication in a mobile wireless network
US7944875B1 (en) 2006-03-06 2011-05-17 Cisco Technology, Inc. Enforcement of user level policies from visited networks in a mobile IP environment
US20070206515A1 (en) * 2006-03-06 2007-09-06 Andreasen Flemming S System and method for generating a unified accounting record for a communication session
US7940722B1 (en) 2006-03-06 2011-05-10 Cisco Technology, Inc. System and method for determining a network for processing applications for a communication session
US20070220251A1 (en) * 2006-03-06 2007-09-20 Rosenberg Jonathan D Establishing facets of a policy for a communication session
US7929966B2 (en) 2006-03-06 2011-04-19 Cisco Technology, Inc. Access terminal for communicating packets using a home anchored bearer path or a visited anchored bearer path
US20070217610A1 (en) * 2006-03-06 2007-09-20 Parviz Yegani System and Method for Access Authentication in a Mobile Wireless Network
US7805127B2 (en) 2006-03-06 2010-09-28 Cisco Technology, Inc. System and method for generating a unified accounting record for a communication session
US20070220588A1 (en) * 2006-03-06 2007-09-20 Biswaranjan Panda Application-aware policy enforcement
US8015594B2 (en) * 2006-03-17 2011-09-06 Cisco Technology, Inc. Techniques for validating public keys using AAA services
US20070220589A1 (en) * 2006-03-17 2007-09-20 Cisco Technology, Inc. Techniques for validating public keys using AAA services
US20100064341A1 (en) * 2006-03-27 2010-03-11 Carlo Aldera System for Enforcing Security Policies on Mobile Communications Devices
US8413209B2 (en) * 2006-03-27 2013-04-02 Telecom Italia S.P.A. System for enforcing security policies on mobile communications devices
US20080263647A1 (en) * 2006-07-21 2008-10-23 General Electric Company System and Method For Providing Network Device Authentication
US7934258B2 (en) * 2006-08-17 2011-04-26 Informod Control Inc. System and method for remote authentication security management
US20080046989A1 (en) * 2006-08-17 2008-02-21 Mark Frederick Wahl System and method for remote authentication security management
US20080065884A1 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Method and apparatus for establishing security association between nodes of an ad hoc wireless network
US7707415B2 (en) * 2006-09-07 2010-04-27 Motorola, Inc. Tunneling security association messages through a mesh network
US7734052B2 (en) 2006-09-07 2010-06-08 Motorola, Inc. Method and system for secure processing of authentication key material in an ad hoc wireless network
WO2008030679A2 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Tunneling security association messages through a mesh network
US20080063205A1 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Tunneling security association messages through a mesh network
US20080063204A1 (en) * 2006-09-07 2008-03-13 Motorola, Inc. Method and system for secure processing of authentication key material in an ad hoc wireless network
WO2008030679A3 (en) * 2006-09-07 2008-10-09 Motorola Inc Tunneling security association messages through a mesh network
US8578159B2 (en) 2006-09-07 2013-11-05 Motorola Solutions, Inc. Method and apparatus for establishing security association between nodes of an AD HOC wireless network
US20080127317A1 (en) * 2006-11-27 2008-05-29 Futurewei Technologies, Inc. System for using an authorization token to separate authentication and authorization services
US8539559B2 (en) 2006-11-27 2013-09-17 Futurewei Technologies, Inc. System for using an authorization token to separate authentication and authorization services
US20080178274A1 (en) * 2006-11-27 2008-07-24 Futurewei Technologies, Inc. System for using an authorization token to separate authentication and authorization services
US8099597B2 (en) 2007-01-09 2012-01-17 Futurewei Technologies, Inc. Service authorization for distributed authentication and authorization servers
US20080168537A1 (en) * 2007-01-09 2008-07-10 Futurewei Technologies, Inc. Service Authorization for Distributed Authentication and Authorization Servers
US20080195861A1 (en) * 2007-02-09 2008-08-14 Research In Motion Limited Method and system for authenticating peer devices using eap
US8356176B2 (en) * 2007-02-09 2013-01-15 Research In Motion Limited Method and system for authenticating peer devices using EAP
US20080244262A1 (en) * 2007-03-30 2008-10-02 Intel Corporation Enhanced supplicant framework for wireless communications
US8285990B2 (en) * 2007-05-14 2012-10-09 Future Wei Technologies, Inc. Method and system for authentication confirmation using extensible authentication protocol
US20090031138A1 (en) * 2007-05-14 2009-01-29 Futurewei Technologies, Inc. Method and system for authentication confirmation using extensible authentication protocol
EP2171911A4 (en) * 2007-06-25 2014-02-26 Microsoft Corp Device provisioning and domain join emulation over non-secured networks
EP2171911A2 (en) * 2007-06-25 2010-04-07 Microsoft Corporation Device provisioning and domain join emulation over non-secured networks
US8484705B2 (en) 2008-04-25 2013-07-09 Hewlett-Packard Development Company, L.P. System and method for installing authentication credentials on a remote network device
US20090271850A1 (en) * 2008-04-25 2009-10-29 Sally Blue Hoppe System and Method for installing Authentication Credentials On a Network Device
US20090271852A1 (en) * 2008-04-25 2009-10-29 Matt Torres System and Method for Distributing Enduring Credentials in an Untrusted Network Environment
US20090271851A1 (en) * 2008-04-25 2009-10-29 Sally Blue Hoppe System and Method for Installing Authentication Credentials on a Remote Network Device
US9218469B2 (en) * 2008-04-25 2015-12-22 Hewlett Packard Enterprise Development Lp System and method for installing authentication credentials on a network device
US9892244B2 (en) 2008-04-25 2018-02-13 Hewlett Packard Enterprise Development Lp System and method for installing authentication credentials on a network device
US20100051686A1 (en) * 2008-08-29 2010-03-04 Covenant Visions International Limited System and method for authenticating a transaction using a one-time pass code (OTPK)
AU2009222577B2 (en) * 2008-09-30 2012-05-17 Aristocrat Technologies Australia Pty Limited A security method
US8621203B2 (en) 2009-06-22 2013-12-31 Nokia Corporation Method and apparatus for authenticating a mobile device
US20100325427A1 (en) * 2009-06-22 2010-12-23 Nokia Corporation Method and apparatus for authenticating a mobile device
US8578465B2 (en) 2009-07-21 2013-11-05 Cisco Technology, Inc. Token-based control of permitted sub-sessions for online collaborative computing sessions
US20120017098A1 (en) * 2010-07-14 2012-01-19 Phillip Martin Hallam-Baker Computer Memory With Cryptographic Content Authentication
US9137255B2 (en) * 2011-06-30 2015-09-15 Marvell World Trade Ltd. Verifying server identity
US20130007850A1 (en) * 2011-06-30 2013-01-03 Lambert Paul A Verifying Server Identity
US20130084556A1 (en) * 2011-09-30 2013-04-04 Paul Giampavolo System and method for simulating goods in bulk
US8800010B2 (en) 2012-04-20 2014-08-05 Cisco Technology, Inc. Distributed group temporal key (GTK) state management
US9077772B2 (en) 2012-04-20 2015-07-07 Cisco Technology, Inc. Scalable replay counters for network security
US10129031B2 (en) * 2014-10-31 2018-11-13 Convida Wireless, Llc End-to-end service layer authentication
US10601594B2 (en) 2014-10-31 2020-03-24 Convida Wireless, Llc End-to-end service layer authentication
US10880294B2 (en) 2015-03-16 2020-12-29 Convida Wireless, Llc End-to-end authentication at the service layer using public keying mechanisms
US10110595B2 (en) 2015-03-16 2018-10-23 Convida Wireless, Llc End-to-end authentication at the service layer using public keying mechanisms
US10313137B2 (en) * 2016-07-05 2019-06-04 General Electric Company Method for authenticating devices in a medical network
US20180013571A1 (en) * 2016-07-05 2018-01-11 General Electric Company Method for authenticating devices in a medical network
US10904368B2 (en) * 2016-11-26 2021-01-26 Huawei Technologies Co., Ltd. System, method and devices for MKA negotiation between the devices
US11246032B1 (en) * 2020-10-29 2022-02-08 Motional Ad Llc Device provisioning and authentication
KR20220057393A (en) * 2020-10-29 2022-05-09 모셔널 에이디 엘엘씨 Device provisioning and authentication
US11785463B2 (en) 2020-10-29 2023-10-10 Motional Ad Llc Device provisioning and authentication

Also Published As

Publication number Publication date
US7793336B2 (en) 2010-09-07
US20070180229A1 (en) 2007-08-02

Similar Documents

Publication Publication Date Title
US7171555B1 (en) Method and apparatus for communicating credential information within a network device authentication conversation
JP4801147B2 (en) Method, system, network node and computer program for delivering a certificate
US7707412B2 (en) Linked authentication protocols
US7370350B1 (en) Method and apparatus for re-authenticating computing devices
EP1897268B1 (en) Method for refreshing a pairwise master key
US8959598B2 (en) Wireless device authentication between different networks
US9015473B2 (en) Method and system for automated and secure provisioning of service access credentials for on-line services to users of mobile communication terminals
EP1900170B1 (en) Short authentication procedure in wireless data communications networks
US8094821B2 (en) Key generation in a communication system
US20050271209A1 (en) AKA sequence number for replay protection in EAP-AKA authentication
US20060019635A1 (en) Enhanced use of a network access identifier in wlan
KR20110113565A (en) Secure access to a private network through a public wireless network
WO2011017924A1 (en) Method, system, server, and terminal for authentication in wireless local area network
KR20080056055A (en) Communication inter-provider roaming authentication method and key establishment method, and recording medium storing program including the same
Kumar et al. A secure, efficient and lightweight user authentication scheme for wireless LAN
Sithirasenan et al. EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability
KR101023605B1 (en) Method of obtaining user ID using tunneled transport layer security
Huang et al. OSNP: Secure wireless authentication protocol using one-time key
Latze et al. Strong mutual authentication in a user-friendly way in eap-tls
Zhuo et al. A new authentication and key exchange protocol in WLAN
Latze Towards a secure and user friendly authentication method for public wireless networks
Billington et al. Mutual authentication of B3G devices within personal distributed environments
Networking Project IEEE 802.16 Broadband Wireless Access Working Group< http://ieee802. org/16> Title Enhancement of 802.16 e to Support EAP-based Authentication/Key Distribution Rev. 3
Networking Project IEEE 802.16 Broadband Wireless Access Working Group< http://ieee802. org/16> Title Enhancement of 802.16 e to Support EAP-based Authentication/Key Distribution Rev. 4
Pala How to Bootstrap Trust among Devices in Wireless Environments via EAP-STLS

Legal Events

Date Code Title Description
AS Assignment

Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SALOWEY, JOSEPH;GOSSMAN, WILLIAM;REEL/FRAME:014133/0701

Effective date: 20030528

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Expired due to failure to pay maintenance fee

Effective date: 20190130